Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph-based representation and techniques for NLU application development., and . ICASSP (1), page 288-291. IEEE, (2003)New distance measures for text-independent speaker identification., , and . INTERSPEECH, page 811-814. ISCA, (2000)A hybrid HMM-MLP speaker verification algorithm for telephone speech., and . ICASSP (1), page 153-156. IEEE Computer Society, (1994)Cultural voice markers in speech-to-speech machine translation systems., , , and . IWIC, page 313-316. ACM, (2009)RTTS: towards enterprise-level real-time speech transcription and translation services., , , , , , , , , and 2 other author(s). INTERSPEECH, page 436-439. ISCA, (2009)Towards robust telephony speech recognition in office and automobile environments., and . INTERSPEECH, page 955-958. ISCA, (2000)Key-phrase spotting using an integrated language model of n-grams and finite-state grammar., , , and . EUROSPEECH, page 255-258. ISCA, (1997)Conversational help desk: vague callers and context switch., , , , , and . INTERSPEECH, ISCA, (2006)Cognitive mobile security: invited conference keynote., , , and . MOBILESoft, page 267-268. ACM, (2016)A new confidence measure based on rank-ordering subphone scores., , , and . ICSLP, ISCA, (1998)